To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps’ Privacy Permission Settings
暂无分享,去创建一个
[1] Malcolm Hall,et al. ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing , 2013, MobiSys '13.
[2] David A. Wagner,et al. Android Permissions Remystified: A Field Study on Contextual Integrity , 2015, USENIX Security Symposium.
[3] Karl Aberer,et al. The Curious Case of the PDF Converter that Likes Mozart: Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps , 2016, Proc. Priv. Enhancing Technol..
[4] Diomidis Spinellis,et al. Trusted third party services for deploying secure telemedical applications over the WWW , 1999, Comput. Secur..
[5] Studying the effectiveness of android application permissions requests , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[6] Norman M. Sadeh,et al. Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings , 2014, SOUPS.
[7] Blase Ur,et al. Measuring password guessability for an entire university , 2013, CCS.
[8] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[9] Robert Kosara,et al. Do Mechanical Turks dream of square pie charts? , 2010, BELIV '10.
[10] L. Jean Camp,et al. Peer-produced privacy protection , 2013, 2013 IEEE International Symposium on Technology and Society (ISTAS): Social Implications of Wearable Computing and Augmediated Reality in Everyday Life.
[11] Philip D. Waggoner,et al. Are samples drawn from Mechanical Turk valid for research on political ideology? , 2015 .
[12] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[13] Ernesto Damiani,et al. P2P-based collaborative spam detection and filtering , 2004 .
[14] Lorrie Faith Cranor,et al. Privacy as part of the app decision-making process , 2013, CHI.
[15] Michael K. Reiter,et al. Resilient Authentication Using Path Independence , 1998, IEEE Trans. Computers.
[16] L. Jean Camp,et al. PEER PATCHING - RAPID RESPONSE IN DISTRIBUTED SYSTEMS , 2004 .
[17] Ahmad-Reza Sadeghi,et al. Towards Taming Privilege-Escalation Attacks on Android , 2012, NDSS.
[18] Kang G. Shin,et al. Location Privacy Protection for Smartphone Users , 2014, CCS.
[19] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[20] Irit Dinur,et al. Revealing information while preserving privacy , 2003, PODS.
[21] Adrian Perrig,et al. Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing , 2008, USENIX Annual Technical Conference.
[22] L. Jean Camp,et al. PeerSec: Towards Peer Production and Crowdsourcing for Enhanced Security , 2012, HotSec.
[23] Carol J. Fung,et al. Dude, ask the experts!: Android resource access permission recommendation with RecDroid , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[24] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[25] Hao Chen,et al. Quantifying the Effects of Removing Permissions from Android Applications , 2013 .
[26] Lorrie Faith Cranor,et al. A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.
[27] Umesh Shankar,et al. Doppelganger: Better browser privacy without the bother , 2006, CCS '06.
[28] Bill Tomlinson,et al. Who are the crowdworkers?: shifting demographics in mechanical turk , 2010, CHI Extended Abstracts.
[29] L. Jean Camp,et al. Privacy Tradeoffs: Myth or Reality? Panel , 2002, Financial Cryptography.
[30] Alessandro Acquisti,et al. Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions , 2016, SOUPS.
[31] A. Acquisti,et al. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk , 2013, Behavior Research Methods.
[32] Helen J. Wang,et al. User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems , 2012, 2012 IEEE Symposium on Security and Privacy.
[33] David A. Wagner,et al. The Effectiveness of Application Permissions , 2011, WebApps.
[34] Joseph S. Dumas,et al. Comparison of three one-question, post-task usability questionnaires , 2009, CHI.
[35] Laura A. Dabbish,et al. Privacy Attitudes of Mechanical Turk Workers and the U.S. Public , 2014, SOUPS.
[36] Jason I. Hong,et al. Mobile Application Evaluation Using Automation and Crowdsourcing , 2013 .
[37] Kwong-Sak Leung,et al. A Survey of Crowdsourcing Systems , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[38] Matthew Lease,et al. Crowdsourcing for Usability Testing , 2012, ASIST.
[39] Michael K. Reiter,et al. Crowdsourced Exploration of Security Configurations , 2015, CHI.
[40] Haoyu Wang,et al. Using text mining to infer the purpose of permission use in mobile apps , 2015, UbiComp.
[41] Eran Toch,et al. Crowdsourcing privacy preferences in context-aware applications , 2012, Personal and Ubiquitous Computing.
[42] L. Jean Camp,et al. Pools, clubs and security: designing for a party not a person , 2012, NSPW '12.